{"uuid": "7b698196-192f-46d6-a3cf-6d7cdcf532bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30582", "type": "seen", "source": "https://t.me/cvedetector/5035", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-30582 - \"Node.js File Watching Permission Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2023-30582 \nPublished : Sept. 7, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : A vulnerability has been identified in Node.js version 20, affecting users of the experimental permission model when the --allow-fs-read flag is used with a non-* argument. This flaw arises from an inadequate permission model that fails to restrict file watching through the fs.watchFile API. As a result, malicious actors can monitor files that they do not have explicit read access to.  \n  \nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T19:20:39.000000Z"}